Basic Configuration between switches
Posted: 20 Apr 2016 12:18
Hi , I am very new to these switches (and Alcatel) and am trying to set up 3 switches all with the same VLANs, which I have managed successfully. These switches are connected via SPF links and are happily talking to each other but I just need confirmation that I have set things up correctly particularly regarding the VLANS and routing:
Switch 1, Switch 2 and Switch 3 are located on separate floors, have the following VLANs and are connected to each other via SPF
VLAN1 (default)
VLAN20 (internal)
VLAN30 (VOIP)
VLAN80 (External)
I have created ip interfaces for each of the VLANS on all switches. For example on Switch 1:
ip interface int-20 address 192.168.20.5 mask 255.255.255.0
ip interface voip-30 address 192.168.30.5 mask 255.255.255.0
ip interface voip-80 address 194.80.25.5 mask 255.255.255.0
Do I need to create ip interfaces for all all VLANs on all the switches ? I connect to the switches via the VLAN20 interface. Is this correct or are ip interfaces only used for management connections to the switch ?
I have configured 802.1q trunking on all the switches to enable VLANs to talk to each other as well as PoE settings etc..all fine there..
The second question I have is regarding Switch 3, which sits at the edge of our network. It has separate physical connections to our router/firewall various interfaces:
VLAN20 - a single cable from a port in this vlan is plugged into the internal interface of the router/firewall.
VLAN30 - a single cable from a port in this vlan is plugged into the VOIP interface of the router/firewall
VLAN80 - a single cable from a port in this vlan is plugged into the external interface of the router/firewall
I think this is referred to as a core switch but I'm not sure as its configuration is virtually the same as the other two switches. Should this switch be configured any differently from the others ? Do I need to set up a default gateway for any of the VLANs that require access to the internet or do I need to set up a static default route on each switch pointing to the router/firewall for those VLANs that require internet access ?
Switch 1, Switch 2 and Switch 3 are located on separate floors, have the following VLANs and are connected to each other via SPF
VLAN1 (default)
VLAN20 (internal)
VLAN30 (VOIP)
VLAN80 (External)
I have created ip interfaces for each of the VLANS on all switches. For example on Switch 1:
ip interface int-20 address 192.168.20.5 mask 255.255.255.0
ip interface voip-30 address 192.168.30.5 mask 255.255.255.0
ip interface voip-80 address 194.80.25.5 mask 255.255.255.0
Do I need to create ip interfaces for all all VLANs on all the switches ? I connect to the switches via the VLAN20 interface. Is this correct or are ip interfaces only used for management connections to the switch ?
I have configured 802.1q trunking on all the switches to enable VLANs to talk to each other as well as PoE settings etc..all fine there..
The second question I have is regarding Switch 3, which sits at the edge of our network. It has separate physical connections to our router/firewall various interfaces:
VLAN20 - a single cable from a port in this vlan is plugged into the internal interface of the router/firewall.
VLAN30 - a single cable from a port in this vlan is plugged into the VOIP interface of the router/firewall
VLAN80 - a single cable from a port in this vlan is plugged into the external interface of the router/firewall
I think this is referred to as a core switch but I'm not sure as its configuration is virtually the same as the other two switches. Should this switch be configured any differently from the others ? Do I need to set up a default gateway for any of the VLANs that require access to the internet or do I need to set up a static default route on each switch pointing to the router/firewall for those VLANs that require internet access ?